8.4
CVE-2019-3695
- EPSS 0.12%
- Veröffentlicht 03.03.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 04:42:21
- Quelle meissner@suse.de
- Teams Watchlist Login
- Unerledigt Login
A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Opensuse ≫ Pcp Version < 3.11.9-5.8.1
Suse ≫ Linux Enterprise High Performance Computing Version15.0 SwEditionespos
Suse ≫ Linux Enterprise High Performance Computing Version15.0 SwEditionltss
Suse ≫ Linux Enterprise Server Version15
Suse ≫ Linux Enterprise Server Version15 SwPlatformltss
Suse ≫ Linux Enterprise Server Version15 SwPlatformsap
Suse ≫ Linux Enterprise High Performance Computing Version15.0 SwEditionltss
Suse ≫ Linux Enterprise Server Version15
Suse ≫ Linux Enterprise Server Version15 SwPlatformltss
Suse ≫ Linux Enterprise Server Version15 SwPlatformsap
Opensuse ≫ Pcp Version < 3.11.9-6.14.1
Suse ≫ Linux Enterprise Software Development Kit Version12 Updatesp4
Suse ≫ Linux Enterprise Software Development Kit Version12 Updatesp5
Suse ≫ Linux Enterprise Software Development Kit Version12 Updatesp5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.313 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
meissner@suse.de | 8.4 | 2.5 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.